CA2673322C - Procede et dispositif de detection de fraude informatique - Google Patents

Procede et dispositif de detection de fraude informatique Download PDF

Info

Publication number
CA2673322C
CA2673322C CA2673322A CA2673322A CA2673322C CA 2673322 C CA2673322 C CA 2673322C CA 2673322 A CA2673322 A CA 2673322A CA 2673322 A CA2673322 A CA 2673322A CA 2673322 C CA2673322 C CA 2673322C
Authority
CA
Canada
Prior art keywords
candidate destination
destination
graphical rendering
text version
candidate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2673322A
Other languages
English (en)
Other versions
CA2673322A1 (fr
Inventor
John Reumann
Dinesh Verma
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CA2673322A1 publication Critical patent/CA2673322A1/fr
Application granted granted Critical
Publication of CA2673322C publication Critical patent/CA2673322C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Information Transfer Between Computers (AREA)
  • Burglar Alarm Systems (AREA)
  • Debugging And Monitoring (AREA)
  • Hardware Redundancy (AREA)
  • Computer And Data Communications (AREA)

Abstract

L'invention concerne des techniques de détection de fraude informatique, ces techniques consistant à obtenir une version texte d'une destination candidate et un rendu graphique de la destination candidate, à comparer la version texte de la destination candidate et le rendu graphique de la destination candidate avec une version texte correspondante d'une destination stockée et un rendu graphique correspondant d'une destination stockée, à générer une alerte de fraude si le rendu graphique de la destination candidate est sensiblement similaire au rendu graphique de la destination stockée alors que la version texte de la destination candidate diffère sensiblement de la version texte correspondante de la destination stockée.
CA2673322A 2007-01-16 2007-12-12 Procede et dispositif de detection de fraude informatique Active CA2673322C (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/623,516 2007-01-16
US11/623,516 US9521161B2 (en) 2007-01-16 2007-01-16 Method and apparatus for detecting computer fraud
PCT/EP2007/063845 WO2008086924A1 (fr) 2007-01-16 2007-12-12 Procede et dispositif de detection de fraude informatique

Publications (2)

Publication Number Publication Date
CA2673322A1 CA2673322A1 (fr) 2008-07-24
CA2673322C true CA2673322C (fr) 2017-04-11

Family

ID=39345456

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2673322A Active CA2673322C (fr) 2007-01-16 2007-12-12 Procede et dispositif de detection de fraude informatique

Country Status (11)

Country Link
US (2) US9521161B2 (fr)
EP (1) EP2104901B1 (fr)
JP (1) JP2010516007A (fr)
KR (1) KR20090108000A (fr)
AT (1) ATE497620T1 (fr)
BR (1) BRPI0720343B1 (fr)
CA (1) CA2673322C (fr)
DE (1) DE602007012369D1 (fr)
ES (1) ES2359466T3 (fr)
IL (1) IL200487A (fr)
WO (1) WO2008086924A1 (fr)

Families Citing this family (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US8220047B1 (en) * 2006-08-09 2012-07-10 Google Inc. Anti-phishing system and method
US7725585B2 (en) * 2006-08-31 2010-05-25 Red Hat, Inc. Methods and systems for alerting a user interface with full destination information
US20080162449A1 (en) * 2006-12-28 2008-07-03 Chen Chao-Yu Dynamic page similarity measurement
US7958555B1 (en) * 2007-09-28 2011-06-07 Trend Micro Incorporated Protecting computer users from online frauds
US8315951B2 (en) * 2007-11-01 2012-11-20 Alcatel Lucent Identity verification for secure e-commerce transactions
US9325731B2 (en) * 2008-03-05 2016-04-26 Facebook, Inc. Identification of and countermeasures against forged websites
US8850569B1 (en) * 2008-04-15 2014-09-30 Trend Micro, Inc. Instant messaging malware protection
US8307431B2 (en) * 2008-05-30 2012-11-06 At&T Intellectual Property I, L.P. Method and apparatus for identifying phishing websites in network traffic using generated regular expressions
GB0813668D0 (en) * 2008-07-25 2008-09-03 Ixico Ltd Image data fraud detection systems
GB2462456A (en) * 2008-08-08 2010-02-10 Anastasios Bitsios A method of determining whether a website is a phishing website, and apparatus for the same
US8346754B2 (en) * 2008-08-19 2013-01-01 Yahoo! Inc. Generating succinct titles for web URLs
US8255997B2 (en) 2008-09-29 2012-08-28 At&T Intellectual Property I, L.P. Contextual alert of an invasion of a computer system
US8904540B1 (en) * 2008-12-17 2014-12-02 Symantec Corporation Method and apparatus for evaluating hygiene of a computer
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9027100B2 (en) * 2010-01-05 2015-05-05 Yahoo! Inc. Client-side ad caching for lower ad serving latency
US8566950B1 (en) * 2010-02-15 2013-10-22 Symantec Corporation Method and apparatus for detecting potentially misleading visual representation objects to secure a computer
CN102457500B (zh) * 2010-10-22 2015-01-07 北京神州绿盟信息安全科技股份有限公司 一种网站扫描设备和方法
US9122870B2 (en) * 2011-09-21 2015-09-01 SunStone Information Defense Inc. Methods and apparatus for validating communications in an open architecture system
EP2758889B1 (fr) * 2011-09-21 2019-06-05 David K. Ford Procédés et appareil de validation de communications dans système à architecture ouverte
US8700913B1 (en) * 2011-09-23 2014-04-15 Trend Micro Incorporated Detection of fake antivirus in computers
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US9432401B2 (en) 2012-07-06 2016-08-30 Microsoft Technology Licensing, Llc Providing consistent security information
WO2014022813A1 (fr) 2012-08-02 2014-02-06 The 41St Parameter, Inc. Systèmes et procédés d'accès à des enregistrements via des localisateurs de dérivé
US9306973B2 (en) * 2012-08-06 2016-04-05 Empire Technology Development Llc Defending against browser attacks
WO2014078569A1 (fr) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systèmes et procédés d'identification globale
US9215242B2 (en) * 2012-12-19 2015-12-15 Dropbox, Inc. Methods and systems for preventing unauthorized acquisition of user information
JP5760057B2 (ja) * 2013-03-04 2015-08-05 株式会社オプティム セキュリティサーバ、ユーザ端末、ウェブページ鑑定方法、セキュリティサーバ用プログラム
US11386181B2 (en) * 2013-03-15 2022-07-12 Webroot, Inc. Detecting a change to the content of information displayed to a user of a website
US20150067853A1 (en) * 2013-08-27 2015-03-05 Georgia Tech Research Corporation Systems and methods for detecting malicious mobile webpages
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
WO2015098253A1 (fr) * 2013-12-26 2015-07-02 株式会社ニコン Dispositif électronique
EP3195171B1 (fr) * 2014-07-31 2019-11-06 Namogoo Technologies Ltd. Détection et élimination d'éléments injectés présents dans des interfaces de contenu
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US9473531B2 (en) * 2014-11-17 2016-10-18 International Business Machines Corporation Endpoint traffic profiling for early detection of malware spread
US11023117B2 (en) * 2015-01-07 2021-06-01 Byron Burpulis System and method for monitoring variations in a target web page
RU2622626C2 (ru) * 2015-09-30 2017-06-16 Акционерное общество "Лаборатория Касперского" Система и способ обнаружения фишинговых сценариев
US9954877B2 (en) * 2015-12-21 2018-04-24 Ebay Inc. Automatic detection of hidden link mismatches with spoofed metadata
GB201605004D0 (en) * 2016-03-24 2016-05-11 Secr Defence A method of protecting a user from messages with links to malicious websites
US10097580B2 (en) 2016-04-12 2018-10-09 Microsoft Technology Licensing, Llc Using web search engines to correct domain names used for social engineering
US10193923B2 (en) * 2016-07-20 2019-01-29 Duo Security, Inc. Methods for preventing cyber intrusions and phishing activity
WO2018066426A1 (fr) * 2016-10-07 2018-04-12 国立研究開発法人産業技術総合研究所 Dispositif de détermination de page web falsifiée, système de détermination de page web falsifiée, procédé de détermination de page web falsifiée et programme de détermination de page web falsifiée
JP6533823B2 (ja) * 2017-05-08 2019-06-19 デジタルア−ツ株式会社 情報処理装置、情報処理システム、プログラム、記録媒体及び情報処理方法
US20190019058A1 (en) * 2017-07-13 2019-01-17 Endgame, Inc. System and method for detecting homoglyph attacks with a siamese convolutional neural network
US10601866B2 (en) 2017-08-23 2020-03-24 International Business Machines Corporation Discovering website phishing attacks
WO2019089418A1 (fr) * 2017-10-31 2019-05-09 Wood Michael C Système et procédé de sécurité informatique basés sur une destination finale prévue par l'utilisateur
US10943067B1 (en) * 2018-04-25 2021-03-09 Amazon Technologies, Inc. Defeating homograph attacks using text recognition
US10289836B1 (en) 2018-05-18 2019-05-14 Securitymetrics, Inc. Webpage integrity monitoring
EP3809299B1 (fr) * 2018-07-25 2023-03-08 Nippon Telegraph And Telephone Corporation Dispositif d'analyse, procédé d'analyse et programme d'analyse
US10984274B2 (en) * 2018-08-24 2021-04-20 Seagate Technology Llc Detecting hidden encoding using optical character recognition
KR20200034020A (ko) 2018-09-12 2020-03-31 삼성전자주식회사 전자 장치 및 그의 제어 방법
US10885373B2 (en) * 2018-12-28 2021-01-05 Citrix Systems, Inc. Systems and methods for Unicode homograph anti-spoofing using optical character recognition
US11368477B2 (en) * 2019-05-13 2022-06-21 Securitymetrics, Inc. Webpage integrity monitoring
US10755095B1 (en) * 2020-01-02 2020-08-25 Capital One Services, Llc System for scanning solicitations for fraud detection
US11637863B2 (en) * 2020-04-03 2023-04-25 Paypal, Inc. Detection of user interface imitation
US11985133B1 (en) * 2020-04-28 2024-05-14 Equinix, Inc. Gating access to destinations on a network
US20220191177A1 (en) * 2020-12-10 2022-06-16 Kalibro Technologies Ltd. System and method for securing messages
US11882152B2 (en) 2021-07-30 2024-01-23 Bank Of America Corporation Information security system and method for phishing website identification based on image hashing
CN113923011B (zh) * 2021-09-30 2023-10-17 北京恒安嘉新安全技术有限公司 一种网络诈骗的预警方法、装置、计算机设备及存储介质
US20230188563A1 (en) * 2021-12-09 2023-06-15 Blackberry Limited Identifying a phishing attempt

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4468809A (en) * 1981-12-23 1984-08-28 Ncr Corporation Multiple font OCR reader
AU2001240844A1 (en) * 2000-03-14 2001-09-24 Speed-Trap.Com Ltd. Monitoring operation of and interaction with services provided over a network
US6813645B1 (en) * 2000-05-24 2004-11-02 Hewlett-Packard Development Company, L.P. System and method for determining a customer associated with a range of IP addresses by employing a configurable rule engine with IP address range matching
US20020143814A1 (en) * 2001-03-27 2002-10-03 The Code Corporation Systems and methods for automatic insertion of machine-readable graphical codes into printable documents
CA2414205C (fr) 2002-10-15 2008-10-14 Electronic Imaging Systems Corporation Systeme et methode de detection des cheques contrefaits
AU2003293501A1 (en) * 2002-12-13 2004-07-09 Wholesecurity, Inc. Method, system, and computer program product for security within a global computer network
EP1779216A1 (fr) 2004-08-20 2007-05-02 Rhoderick John Kennedy Pugh Authentification de serveur
WO2006026921A2 (fr) 2004-09-07 2006-03-16 Metaswarm (Hongkong) Ltd. Systeme et procede de detection d'hameçonnage et de verification de publicite electronique
US20060080735A1 (en) * 2004-09-30 2006-04-13 Usa Revco, Llc Methods and systems for phishing detection and notification
ATE548841T1 (de) 2005-01-14 2012-03-15 Bae Systems Plc Netzwerkbasiertes sicherheitssystem
JP2006221242A (ja) * 2005-02-08 2006-08-24 Fujitsu Ltd 認証情報詐取防止システム、プログラム及び方法
US20060282383A1 (en) * 2005-06-09 2006-12-14 Ncr Corporation Payment methods and systems enhanced with image comparison for detecting fraudulent checks
US20070068402A1 (en) 2005-09-26 2007-03-29 Pitney Bowes Incorporated Method and apparatus for printing images having fraud detection features
US8763113B2 (en) * 2005-11-28 2014-06-24 Threatmetrix Pty Ltd Method and system for processing a stream of information from a computer network using node based reputation characteristics
US20070136213A1 (en) * 2005-12-08 2007-06-14 Pitney Bowes Incorporated Inline system to detect and show proof of indicia fraud
JP4596556B2 (ja) * 2005-12-23 2010-12-08 インターナショナル・ビジネス・マシーンズ・コーポレーション ネットワーク・アドレスを評価し、アクセスするための方法
US20080046738A1 (en) * 2006-08-04 2008-02-21 Yahoo! Inc. Anti-phishing agent
US20080162449A1 (en) * 2006-12-28 2008-07-03 Chen Chao-Yu Dynamic page similarity measurement
US7882177B2 (en) * 2007-08-06 2011-02-01 Yahoo! Inc. Employing pixel density to detect a spam image
US8189924B2 (en) * 2008-10-15 2012-05-29 Yahoo! Inc. Phishing abuse recognition in web pages
US8448245B2 (en) * 2009-01-17 2013-05-21 Stopthehacker.com, Jaal LLC Automated identification of phishing, phony and malicious web sites

Also Published As

Publication number Publication date
US9083735B2 (en) 2015-07-14
JP2010516007A (ja) 2010-05-13
EP2104901B1 (fr) 2011-02-02
KR20090108000A (ko) 2009-10-14
EP2104901A1 (fr) 2009-09-30
IL200487A0 (en) 2010-04-29
WO2008086924A1 (fr) 2008-07-24
CA2673322A1 (fr) 2008-07-24
ATE497620T1 (de) 2011-02-15
ES2359466T3 (es) 2011-05-23
US20120304295A1 (en) 2012-11-29
DE602007012369D1 (de) 2011-03-17
US20080172741A1 (en) 2008-07-17
US9521161B2 (en) 2016-12-13
BRPI0720343B1 (pt) 2019-05-28
BRPI0720343A2 (pt) 2018-12-04
IL200487A (en) 2013-05-30

Similar Documents

Publication Publication Date Title
CA2673322C (fr) Procede et dispositif de detection de fraude informatique
Mahajan et al. Phishing website detection using machine learning algorithms
Jain et al. Two-level authentication approach to protect from phishing attacks in real time
Jain et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list
US11580760B2 (en) Visual domain detection systems and methods
Alkhozae et al. Phishing websites detection based on phishing characteristics in the webpage source code
Dunlop et al. Goldphish: Using images for content-based phishing analysis
KR101001132B1 (ko) 웹 어플리케이션의 취약성 판단 방법 및 시스템
KR100935776B1 (ko) 네트워크 어드레스 평가 방법, 컴퓨터 판독 가능한 기록 매체, 컴퓨터 시스템, 네트워크 어드레스 액세스 방법, 컴퓨터 인프라를 활용하는 방법 및 기업의 네트워크 통신 트래픽의 분석을 수행하는 방법
Suzuki et al. ShamFinder: An automated framework for detecting IDN homographs
US20080172738A1 (en) Method for Detecting and Remediating Misleading Hyperlinks
US20130263263A1 (en) Web element spoofing prevention system and method
Chiew et al. Leverage website favicon to detect phishing websites
Deshpande et al. Detection of phishing websites using Machine Learning
KR20060102484A (ko) 브라우저 디스플레이 내에서 도메인을 하이라이트하기 위한시스템 및 방법
US9521157B1 (en) Identifying and assessing malicious resources
Kang et al. Advanced white list approach for preventing access to phishing sites
US10984274B2 (en) Detecting hidden encoding using optical character recognition
Geng et al. Favicon-a clue to phishing sites detection
CN103647767A (zh) 一种网站信息的展示方法和装置
Piredda et al. Deepsquatting: Learning-based typosquatting detection at deeper domain levels
US11496510B1 (en) Fully automated target identification of a phishing web site
Fatt et al. Phishdentity: Leverage website favicon to offset polymorphic phishing website
Shahriar et al. Information source-based classification of automatic phishing website detectors
JP2007133488A (ja) 情報発信元検証方法および装置

Legal Events

Date Code Title Description
EEER Examination request